Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joomsky
Joomsky js Help Desk Wordpress Wordpress wordpress |
|
| Vendors & Products |
Joomsky
Joomsky js Help Desk Wordpress Wordpress wordpress |
Wed, 25 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Help Desk js-support-ticket allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JS Help Desk: from n/a through <= 3.0.3. | |
| Title | WordPress JS Help Desk plugin <= 3.0.3 - Insecure Direct Object References (IDOR) vulnerability | |
| Weaknesses | CWE-639 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-03-26T13:36:09.955Z
Reserved: 2026-03-12T11:12:24.777Z
Link: CVE-2026-32535
Updated: 2026-03-26T13:17:01.528Z
Status : Received
Published: 2026-03-25T17:17:07.160
Modified: 2026-03-26T14:16:11.977
Link: CVE-2026-32535
No data.
OpenCVE Enrichment
Updated: 2026-03-26T11:34:55Z